What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Hi,

I noticed that the pixelserv-tls is not running and am not able to activate it, I tried disabling and enabling, restarting, upgrading and updating it without luck, any ideas ?

Asus RT-AC86U with Asuswrt-Merlin 384.10_2 with amtm 1.9 with Diversion 4.0.8
Look in the routers syslog for clues.
 
Hi,

I noticed that the pixelserv-tls is not running and am not able to activate it, I tried disabling and enabling, restarting, upgrading and updating it without luck, any ideas ?

Asus RT-AC86U with Asuswrt-Merlin 384.10_2 with amtm 1.9 with Diversion 4.0.8

Does rebooting the router work?

Do you have the disk checker enabled in amtm for the USB drive? Does it show any errors (after a recent reboot)?

What other scripts do you have running? Are those all updated?
 
Look in the routers syslog for clues.

I think I found the culprit

Apr 8 22:44:56 Diversion: created br0:pixelserv-tls 192.168.1.2, from /opt/etc/init.d/S80pixelserv-tls
Apr 8 22:44:56 pixelserv-tls[12779]: pixelserv-tls 2.2.1 (compiled: Mar 20 2019 07:45:07 flags: tfo tls1_3) options: 192.168.1.2
Apr 8 22:44:56 pixelserv-tls[12779]: Abort: Address already in use - :192.168.1.2:443

it's strange, I reserved the 192.168.1.2 for pixel :(
 
I think I found the culprit



it's strange, I reserved the 192.168.1.2 for pixel :(
Did another device take that IP or is it already on your router? Run this command on your router:
Code:
netstat -anltp | grep " 192.168.1.2:443 "
 
Did another device take that IP or is it already on your router? Run this command on your router:
Code:
netstat -anltp | grep " 192.168.1.2:443 "
I modified the starting pool to 192.168.1.3 so nobody could take 192.168.1.2.

noob question, how can I run that command on my router? directly on ssh? I tried looking for a terminal in the webui but didn't find it.
 
I modified the starting pool to 192.168.1.3 so nobody could take 192.168.1.2.

noob question, how can I run that command on my router? directly on ssh? I tried liklook for a terminal in the webui but didn't find it.
Yes, in the SSH terminal via PuTTY or whatever you used to install Diversion originally. Or just browse to https://192.168.1.2/ to see if anything is listening there.
 
lol, found it

during the weekend I gave AiCloud a try
 

Attachments

  • Screenshot_20190408-231326.jpg
    Screenshot_20190408-231326.jpg
    21.1 KB · Views: 266
I modified the starting pool to 192.168.1.3 so nobody could take 192.168.1.2.

noob question, how can I run that command on my router? directly on ssh? I tried looking for a terminal in the webui but didn't find it.
Did you enable AiCloud on the router? If so, change the port under settings to 9443.
 
Yes, in the SSH terminal via PuTTY or whatever you used to install Diversion originally. Or just browse to https://192.168.1.2/ to see if anything is listening there.

I was not getting any result in the ssh terminal with your command, so I browsed to the address and got it, thanks dave14305
 
nailed it, just did that and now pixel is up and running, thanks decoderman

The name is 'thelonelycoder', but you can call him Bond. ;)
 
The name is 'thelonelycoder', but you can call him Bond. ;)
decoderman is my GitHub handle which is also in the signature. I'm also a fan of the Australian band Decoder Ring.
 
There's a dedicated thread for Diversion on this board.

Thanks for the reply.

Is there anyway to test out if my Diversion is working correctly? like an specific URL? or where can one view the HOST files/URLs that Diversion is blocking?

According to "Use" - "Features" section, https://diversion.ch/diversion/use/features.html, there is an option - "Supports a blacklist and wildcard-blacklist for individual domains to be blocked that are not covered by the blocking file". I would like to know how do I include my own list of about 90 entries/URLs in Diversion?

I want to block these:
- Amazon Fire TV Updates
amzdigital-a.akamaihd.net
amzdigitaldownloads.edgesuite.net
softwareupdates.amazon.com
updates.amazon.com
d1s31zyz7dcc2d.cloudfront.net
montoya-ota
bueller-ota

- HOSTS
www.google-analytics.com
www.googleadservices.com
www.googletagservices.com
www-google-analytics.l.google.com
video-stats.video.google.com
video-ad-stats.googlesyndication.com
tpc.googlesyndication.com
tpcnc.googlesyndication.com
ssl.google-analytics.com
pagead.l.google.com
pagead2.googlesyndication.com
partner.googleadservices.com
partnerad.l.google.com
google-analytics.com
googleads.g.doubleclick.net
googleads2.g.doubleclick.net
googleadservices.com
googlesyndication.com
googletagmanager.com
gg.google.com
analytics.google.com
afs.googlesyndication.com
adservice.google.com
ads.google.com
112.2o7.net

- Ads Filter
adsense.com
adblade.com
207.net
247realmedia.com
2mdn.net
2o7.net
33across.com
abmr.net
adbrite.com
adbureau.net
adchemy.com
addthis.com
addthisedge.com
admeld.com
admob.com
adsonar.com
advertising.com
afy11.net
aquantive.com
atdmt.com
atwola.com
channelintelligence.com
cmcore.com
coremetrics.com
crowdscience.com
decdna.net
decideinteractive.com
doubleclick.com
doubleclick.net
esomniture.com
fimserve.com
flingwebads.com
foxnetworks.com
googleadservices.com
googlesyndication.com
google-analytics.com
gravity.com
hitbox.com
imiclk.com
imrworldwide.com
insightexpress.com
insightexpressai.com
intellitxt.com
invitemedia.com
leadback.com
lindwd.net
mookie1.com
myads.com
netconversions.com
nexac.com
nextaction.net
nielsen-online.com
offermatica.com
omniture.com
omtrdc.net
pm14.com
quantcast.com
quantserve.com
realmedia.com
revsci.net
rightmedia.com
rmxads.com
ru4.com
rubiconproject.com
samsungadhub.com
scorecardresearch.com
sharethis.com
shopthetv.com
acoda.net
targetingmarketplace.com
themig.com
trendnetcloud.com
yieldmanager.com
yieldmanager.net
yldmgrimg.net
youknowbest.com
yumenetworks.com

Thanks.
 
OK, upon doing more readings from https://diversion.ch, https://diversion.ch/diversion/use/blocking-file-hosts-files.html, most of the URLs of my post above are already included in the list http://winhelp2002.mvps.org/hosts.txt:), now I'm reducing the RT-AC68U's "Firewall - URL Filter - URL Filter List:" to just 7 entries:cool: from Amazon FireTV updates.

The wonderful thing about using a router to block ads/URLs is I don't have to individually mess with downloading/updating/duplicates editing with all my PCs/Notebooks's "hosts" in C:\Windows\System32\drivers\etc and its a MAJOR pain in the a** dealing with implementing "hosts" in Android phones/tablets.

Bravo to the creator of Diversion, now I can easily deal with the "URL Filter List: (Max Limit : 64)" in my Asus RT-AC68U with unique/localize URLs such as those from Amazon FireTV updates.

I'm still interested to know how to get my own list (in .txt?) included in Diversion if that's possible.
 
Last edited:
OK, upon doing more readings from https://diversion.ch, https://diversion.ch/diversion/use/blocking-file-hosts-files.html, most of the URLs of my post above are already included in the list http://winhelp2002.mvps.org/hosts.txt:), now I'm reducing the RT-AC68U's "Firewall - URL Filter - URL Filter List:" to just 7 entries:cool: from Amazon FireTV updates.

The wonderful thing about using a router to block ads/URLs is I don't have to individually mess with downloading/updating/duplicates editing with all my PCs/Notebooks's "hosts" in C:\Windows\System32\drivers\etc and its a MAJOR pain the the a** dealing with implementing "hosts" in Android phones/tablets.

Bravo to the creator of Diversion, now I can easily deal with the "URL Filter List: (Max Limit : 64)" in my Asus RT-AC68U with unique/localize URLs such as those from Amazon FireTV updates.

I'm still interested to know how to get my own list (in .txt?) include in Diversion if that's possible.

I thought that you'd have much more help by now. :)

I don't know how to do the whole list at once, but you should be able to enter them individually. I don't use this feature, so I hope others can help here.

Did you read or experiment on how to do that part on your own yet?
 
I thought that you'd have much more help by now. :)

I don't know how to do the whole list at once, but you should be able to enter them individually. I don't use this feature, so I hope others can help here.

Did you read or experiment on how to do that part on your own yet?

Thanks L&LD.

I'm the person and write and read SOP, but I couldn't find the SOP from
https://diversion.ch/. I will now read https://diversion.ch/diversion/manual/alternate-blocking-file.html and see if I could figure it out:cool:.
 
Thanks for the reply.

Is there anyway to test out if my Diversion is working correctly? like an specific URL? or where can one view the HOST files/URLs that Diversion is blocking?

According to "Use" - "Features" section, https://diversion.ch/diversion/use/features.html, there is an option - "Supports a blacklist and wildcard-blacklist for individual domains to be blocked that are not covered by the blocking file". I would like to know how do I include my own list of about 90 entries/URLs in Diversion?

I want to block these:
- Amazon Fire TV Updates
amzdigital-a.akamaihd.net
amzdigitaldownloads.edgesuite.net
softwareupdates.amazon.com
updates.amazon.com
d1s31zyz7dcc2d.cloudfront.net
montoya-ota
bueller-ota

- HOSTS
www.google-analytics.com
www.googleadservices.com
www.googletagservices.com
www-google-analytics.l.google.com
video-stats.video.google.com
video-ad-stats.googlesyndication.com
tpc.googlesyndication.com
tpcnc.googlesyndication.com
ssl.google-analytics.com
pagead.l.google.com
pagead2.googlesyndication.com
partner.googleadservices.com
partnerad.l.google.com
google-analytics.com
googleads.g.doubleclick.net
googleads2.g.doubleclick.net
googleadservices.com
googlesyndication.com
googletagmanager.com
gg.google.com
analytics.google.com
afs.googlesyndication.com
adservice.google.com
ads.google.com
112.2o7.net

- Ads Filter
adsense.com
adblade.com
207.net
247realmedia.com
2mdn.net
2o7.net
33across.com
abmr.net
adbrite.com
adbureau.net
adchemy.com
addthis.com
addthisedge.com
admeld.com
admob.com
adsonar.com
advertising.com
afy11.net
aquantive.com
atdmt.com
atwola.com
channelintelligence.com
cmcore.com
coremetrics.com
crowdscience.com
decdna.net
decideinteractive.com
doubleclick.com
doubleclick.net
esomniture.com
fimserve.com
flingwebads.com
foxnetworks.com
googleadservices.com
googlesyndication.com
google-analytics.com
gravity.com
hitbox.com
imiclk.com
imrworldwide.com
insightexpress.com
insightexpressai.com
intellitxt.com
invitemedia.com
leadback.com
lindwd.net
mookie1.com
myads.com
netconversions.com
nexac.com
nextaction.net
nielsen-online.com
offermatica.com
omniture.com
omtrdc.net
pm14.com
quantcast.com
quantserve.com
realmedia.com
revsci.net
rightmedia.com
rmxads.com
ru4.com
rubiconproject.com
samsungadhub.com
scorecardresearch.com
sharethis.com
shopthetv.com
acoda.net
targetingmarketplace.com
themig.com
trendnetcloud.com
yieldmanager.com
yieldmanager.net
yldmgrimg.net
youknowbest.com
yumenetworks.com

Thanks.
You could add your list to somewhere like Pastebin and then use the RAW link to it to add it as a source in your blocking list.
Make sure to use this format, otherwise it will not be included:
Code:
0.0.0.0 domain.com
 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top